Author: Karl N. Levitt


Publication period start: 1972
Publication period end: 2004
Number of co-authors: 24


Number of publications with favourite co-authors
Brian R. Becker
Lawrence Robinson
Mark Heckman

Productive Colleagues

Most productive colleagues in number of publications
David Miller
Peng Liu
Ruzena Bajcsy


Bajcsy, Ruzena, Benzel, Terry, Bishop, Matt, Braden, Robert, Brodley, Carla E., Fahmy, Sonia, Floyd, Sally, Hardaker, W., Joseph, Anthony D., Kesidis, George, Levitt, Karl N., Lindell, Robert, Liu, Peng, Miller, David, Mundy, Russ, Neuman, Cliford, Ostrenga, Ron (2004): Cyber defense technology networking and evaluation. In Communications of the ACM, 47 (3) pp. 58-61.

Spitzen, Jay M., Levitt, Karl N., Robinson, Lawrence (1978): An Example of Hierarchical Design and Proof. In Communications of the ACM, 21 (12) pp. 1064-1075.

Robinson, Lawrence, Levitt, Karl N. (1977): Proof Techniques for Hierarchically Structured Programs. In Communications of the ACM, 20 (4) pp. 271-283.

Levitt, Karl N., Kautz, William H. (1972): Cellular Arrays for the Solution of Graph Problems. In Communications of the ACM, 15 (9) pp. 789-801.

Heckman, Mark, Levitt, Karl N. (1998): Applying the Composition Principle to Verify a Hierarchy of Security Servers. In: HICSS 1998 , 1998, . pp. 338-347.

Zhang, Cui, Becker, Brian R., Peticolas, Dave, Heckman, Mark, Levitt, Karl N., Olsson, Ronald A. (1997): Verification of a Distributed Computing. In: HICSS 1997 , 1997, . pp. 252-261.